Larry Dignan

Larry Dignan is Editor in Chief of ZDNet and Editorial Director of ZDNet's sister site TechRepublic. He was most recently Executive Editor of News and Blogs at ZDNet. Prior to that he was executive news editor at eWeek and news editor at Baseline. He also served as the East Coast news editor and finance editor at CNET News.com. Larry has covered the technology and financial services industry since 1995, publishing articles in WallStreetWeek.com, Inter@ctive Week, The New York Times, and Financial Planning magazine. He's a graduate of the Columbia School of Journalism and the University of Delaware.

Zack Whittaker

Zack Whittaker is the security editor for ZDNet. You can securely reach him on Signal and WhatsApp at 646-755-8849, and his PGP fingerprint for email is: 4D0E 92F2 E36A EC51 DAAE 5D97 CB8C 15FA EB6C EEA5.

Stephanie Condon

Stephanie Condon is a staff writer for CBS Interactive based in Portland, Oregon, covering business technology for ZDNet. She previously covered politics for CBSNews.com, as well as the intersection of technology and politics for CNET. Stephanie graduated with a B.A. in communication from Stanford University.

Latest Posts

Are you ready for Inescapable Data?

Are you ready for Inescapable Data?

Chris Stakutis, IBM's CTO for emerging storage software, says all businesses are confronting three major tech trends: the phenomenal growth of data; the proliferation of wireless connectivity; and the rise of XML, or self-describing data. He's coined a term for the result.

June 24, 2005 by in Big Data Analytics

Mobile management: the devil is in iAnyWhere's details

Mobile management: the devil is in iAnyWhere's details

If there's a market for the last mile of software -- software that moves actionable data (be it customer information or device management/reconfiguration instructions) closer to the front lines of business where the actual transactions and customer interactions are taking place (whether we're talking about a mobile workforce, a distributed retail operation, or branch offices),  then Sybase subsidiary iAnywhere, along with its year-old acquisition of XcelleNet, is in the thick of that market.

June 24, 2005 by in Mobility

Fishy e-mail reeks of phishing, or something worse

Fishy e-mail reeks of phishing, or something worse

Bob Frankston has encapsulated a very suspicious e-mail  that he received (or thinks he received) from Bank of America in a longer expression to Dave Farber's List of his worries and concerns that his private communications with the financial institution were seriously breached.  Being the technical guy that he is, Frankston tried to diagnose the problem via dissection of e-mail and IP diagnostic data, but only got far enough to know something is very wrong.

June 22, 2005 by in Networking

The key to lowering transaction costs

The key to lowering transaction costs

During a panel discussion about distributed business at SuperNova 2005, Philip Evans of the Boston Consulting Group (BCG) and author of "Blown to Bits: How the New Economics of Information Transforms Strategy," offered up some basic principles for business success, which he defined primarily as lowering transaction costs.

June 22, 2005 by in Networking

HP ships oddly positioned AMD64 notebook in the name of "choice"

HP ships oddly positioned AMD64 notebook in the name of "choice"

If there ever was a case study for the uphill battle that AMD must face to get its chips into the marketplace (64-bit or not), today's announcement of the $999 Turion 64-based nx6125 notebook computer by HP is probably it.  The Turion is AMD's most power-aware and conservative mobile chip to date that includes the AMD64 technology -- a 32-bit/64-bit hybrid architecture that supports traditional 32-bit applications as well as ones written to take advantage of AMD's 64-bit extensions.

June 22, 2005 by in Hardware

Memory firewall to the rescue

Memory firewall to the rescue

Last month I met with Nand Mulchandani and Charles Renert of Determina, which has developed unique security software that the company claims stops all memory-based attacks--such as stack and heap overflows, format string vulnerabilities and shatter attacks. Given that every critical server vulnerability in the last few years has been memory-based and about 60 percent of Windows vulnerabilities as well, Determina has tapped into the major root of the cybersecurity problem.

June 21, 2005 by in Security

Schwartz: Blogs are essential for leadership

Schwartz: Blogs are essential for leadership

During an interview with Supernova 2005 conference host Kevin Werbach, Sun President, COO and chief blogger Jonathan Schwartz called blogging essential for leadership. "If you want to be a leader, I can't see surviving without a blog.

June 21, 2005 by in Telcos

Does Microsoft know what IT shops really need?

Does Microsoft know what IT shops really need?

David Berlind's Feature heap won't undo LAMP's toll on Microsoft brings to mind the importance of understanding the client's needs. The Microsoft juggernaut came about, in large part, because Bill Gates envisioned a one-stop-shopping model by which the consumer could go to one vendor and buy one product (a PC configured with Windows and Office) and meet 95% of the their needs.

June 21, 2005 by in Enterprise Software

Newsletters

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
See All
See All

Top Stories